Mobile Security

News

Malicious Web ads outpace pornography as 2014's biggest mobile threat

By David Braue | 12 March, 2014 15:02

Advertisements with embedded malware have outpaced pornographic Web content as the biggest threat to the security of mobile devices, new figures from security firm Blue Coat suggest.

Samsung and Microsoft team up to on BYOD Android authentication

By Liam Tung | 03 March, 2014 09:52

Samsung and Microsoft have tied up a deal around Knox and Windows Server 2012 R2 that should make it easier to put Galaxy Android BYOD devices on the corporate network.

Mobiles, human error hitting business security posture: CompTIA

By David Braue | 07 February, 2014 16:50

Human error remains the biggest moderate concern for IT administrators but is losing ground to malware, hacking, cloud computing, and social engineering on the security-threat leaderboard, recent figures from industry association CompTIA have revealed.

CSOs' security burden to grow as Asia-Pacific leads mobile, Wi-Fi explosion through 2018

By David Braue | 06 February, 2014 13:56

CSOs concerned about the pace of mobile technology adoption and its security implications will find little solace in the latest Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018, which has presaged an exploding IT-security threat as machine-to-machine (M2M) and other devices push the number of connections to more than 10 billion by 2018.

Android, 4G mobiles leading infection surge: Alcatel-Lucent

By David Braue | 31 January, 2014 16:55

Mobiles on 4G networks comprise the lion's share of the more than 11.6 million mobile devices infected with malware at any given time, with the rate of mobile infection soaring ahead of infections of fixed-broadband users, according to new research into malware infections released by Alcatel-Lucent subsidiary Kindsight.

Reviews

Review: Mobile Device Management

By Ashton Mills | 20 May, 2013 13:36

With the rise of mobile computing -- first via laptops, then smartphones and now tablets -- the IT landscape changed within the enterprise. No more was IT just about the local network, WANs and security for desktops and servers: it now had to incorporate mobile devices, spanning all manner of manufacturers, operating systems, and platforms and to do so without compromising security. The sheer volume of devices and the different software they run is a natural antithesis to network security. Yet, these devices are integral to the way business works today, and so the IT department must adapt.

Opinions

iPhone security: NSA’s powerful spy tool suggests foul play

By Jessica Carol | 28 January, 2014 11:17

Over the months, the leaked NSA documents have provided enough evidence to confirm that the government agency knows no limits when it comes to snooping and has a complete disregard for individual privacy.

BYOD: Keep your ‘eyes on the enterprise’

By Terry Steer | 19 July, 2013 15:38

Bring your own device (BYOD) will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organisation. We already know that these devices include tablets, including iOS and Android smartphones, “Wintel” laptops, but there are many devices we are yet to see.

Corporate IT must address employees’ indifference to IT policy

By Sandeep Joshi | 08 November, 2012 10:27

Now that employees increasingly expect the workplace to provide secured any time, anywhere connection – whether over 2G or 3G networks or Wi-Fi, for both personal and business tasks – it’s clear that IT management has lost its mandate on the choice of smartphone and tablet access in the corporate setting.

Managing the mobile security paradigm

By Gordon Makryllos | 09 August, 2012 13:20

There have been profound changes in recent years in the way that people work. Mobility, virtualisation and globalisation have extensively altered how business is conducted. These changes mean that updated and upgraded security systems are needed to ensure data security.

Addressing the security risks of BYO device

By Ian Yip | 29 March, 2012 09:38 | 3 Comments

The head of security hastily leaves the meeting without excusing herself. Her body language indicates that it is an important call. As she walks back in, all eyes in the room subliminally pose the same question. Without further prompting, the head of security says: “The CEO wants to know why she can’t watch a YouTube video on her iPad. It’s against policy, but we have to make it happen. While we’re at it, she also wants to be able to access her email and calendar on her iPhone”. This actually happened at a large financial institution.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Trust Authority

Reduce complexity and increase trust for public cloud service providers and their customers.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.